Analysis

  • max time kernel
    234s
  • max time network
    337s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 12:48

General

  • Target

    ce73a9374aa610412ef0fcdb6c4e0fd439ab8f49ba06576bdfd06491bad628a4.dll

  • Size

    4KB

  • MD5

    f6b53879aa9deb08ce89a98cd111b1e0

  • SHA1

    7be22bbcbb42087ef15d6915ac149bc3c8b6c8bd

  • SHA256

    ce73a9374aa610412ef0fcdb6c4e0fd439ab8f49ba06576bdfd06491bad628a4

  • SHA512

    1c1718fedbd2ae2003daacfdd8fa184856e7b8c2de5f71433675999b6f4f234689572b1488f7b3f017983d6e114eca9ddd7f9c20bf65ddfd9423e9ee98322991

  • SSDEEP

    48:iMHGv8j2IcW89NYEArhWHR0MiiIsiI6lXVkqlcH2SuiS6o+mm9kl+/9W:PmkiIz8UZrQ0MhI/ITqly9kl+/k

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ce73a9374aa610412ef0fcdb6c4e0fd439ab8f49ba06576bdfd06491bad628a4.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:268
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ce73a9374aa610412ef0fcdb6c4e0fd439ab8f49ba06576bdfd06491bad628a4.dll,#1
      2⤵
        PID:2032

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2032-55-0x0000000075D11000-0x0000000075D13000-memory.dmp

      Filesize

      8KB